Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2450015iob; Fri, 20 May 2022 09:35:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyT9ORxeQZSe81CIthpeeSFY4JNLOsn7pRc224u+BFYc0tmvMbu3G74rvAdZR8ZorArPuY4 X-Received: by 2002:a17:906:7954:b0:6f3:c1c8:f814 with SMTP id l20-20020a170906795400b006f3c1c8f814mr9812691ejo.230.1653064504600; Fri, 20 May 2022 09:35:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653064504; cv=none; d=google.com; s=arc-20160816; b=ZntwpCDtA+y2/JbUMUwjDcdhSXWZk40Y6JHIYOdiNA30tTJ7Q9KX9GYu7h9xnqeZZo VeNrMbAKAL/acKxAKw+iCBfvMrl345TDoYtqxAdjkZlYqsHcU9jhzzTYJ7SeiegnIDyS M2pt/NAKo3lr+kI2+F/yT4ZrIF1cqNKKiuQ9pQthYHnZZOu7RPC77DMHMiIs5sTjNwls z7g7ZZIct0FlR9gVhGZVErQYqvbYSKi0POZ9MHmSNEcsJTnbRiBaOAT92tfVubdSveJ6 Unafw5OA13D4ug+cmBJyFfyqEVUOnRm8+a2tc4fgyOIdPv3P3hkvcpf5CppOuLwvHVwu 5xLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=guIqxfi+Y18dR2XTGQTAACpSdH3sm3EcZeENzzj3jyc=; b=q9WsexgvPG2GJccmZuLlgbvuWeV+kqLcdpprv1svmxIOM2wOt1gepUs5eQeqlSPVxh X2d5GxtT5/Af46YOjUUC+79IJmt/sWxBb2Hcm0i/mxQz8RZ3JBqFiXncNCxmKTC6Nb3U aZRyZh818nKM3qbHcY6n84R9kBnOeyStXHndlUsD/MuHTd+APgENPdEwuWNZ2GTNoRBN 436UulvFHBnZtyW46s4QygPFmxHK4NFcWlvSDj1jQkKP0zCRn2oC1GFcIL7sf62WEJHp gsocPTRlGOdw0cuQVdRVy+5T0970Thd+u9VRBcq1ji2bl1ABj6wHQATfQHOPH42Xgacc 4kXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cf4-20020a0564020b8400b0042b0dc85de3si3046791edb.341.2022.05.20.09.34.27; Fri, 20 May 2022 09:35:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345658AbiETF5f (ORCPT + 99 others); Fri, 20 May 2022 01:57:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42040 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244615AbiETF5c (ORCPT ); Fri, 20 May 2022 01:57:32 -0400 Received: from fornost.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DA3EE13326E; Thu, 19 May 2022 22:57:31 -0700 (PDT) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1nrvda-00FhyN-PW; Fri, 20 May 2022 15:57:24 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 20 May 2022 13:57:23 +0800 Date: Fri, 20 May 2022 13:57:23 +0800 From: Herbert Xu To: Giovanni Cabiddu Cc: linux-crypto@vger.kernel.org, qat-linux@intel.com, stable@vger.kernel.org, Adam Guerin , Wojciech Ziemba Subject: Re: [PATCH] crypto: qat - set to zero DH parameters before free Message-ID: References: <20220509131927.55387-1-giovanni.cabiddu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220509131927.55387-1-giovanni.cabiddu@intel.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, May 09, 2022 at 02:19:27PM +0100, Giovanni Cabiddu wrote: > Set to zero the context buffers containing the DH key before they are > freed. > This is a defense in depth measure that avoids keys to be recovered from > memory in case the system is compromised between the free of the buffer > and when that area of memory (containing keys) gets overwritten. > > Cc: stable@vger.kernel.org > Fixes: c9839143ebbf ("crypto: qat - Add DH support") > Signed-off-by: Giovanni Cabiddu > Reviewed-by: Adam Guerin > Reviewed-by: Wojciech Ziemba > --- > drivers/crypto/qat/qat_common/qat_asym_algs.c | 3 +++ > 1 file changed, 3 insertions(+) Patch applied. Thansk. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt